US20090247131A1 - Systems and Methods for Restricting The Use of Stolen Devices on a Wireless Network - Google Patents
Systems and Methods for Restricting The Use of Stolen Devices on a Wireless Network Download PDFInfo
- Publication number
- US20090247131A1 US20090247131A1 US12/479,329 US47932909A US2009247131A1 US 20090247131 A1 US20090247131 A1 US 20090247131A1 US 47932909 A US47932909 A US 47932909A US 2009247131 A1 US2009247131 A1 US 2009247131A1
- Authority
- US
- United States
- Prior art keywords
- device identifier
- wireless
- identifier
- management system
- sold
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000004891 communication Methods 0.000 claims description 16
- 238000004806 packaging method and process Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract 1
- 238000007726 management method Methods 0.000 description 44
- 230000004913 activation Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
Definitions
- This disclosure relates generally to the field of wireless services and, more particularly, to restrictions on the use of stolen wireless devices on a wireless network.
- Wireless telephone service has gained widespread acceptance and popularity throughout much of the modern world. Advanced technologies on the horizon will speed the delivery of data to and from mobile devices as well as make voice calls more reliable, further increasing the desirability of having access to wireless services. Many individuals are deciding to discontinue landline service altogether, relying solely on wireless service for telephone voice communications.
- Postpaid access plans generally allow the mobile customer to use airtime during a period for which the customer is billed at a later date. Enrollment in such a plan can require a level of trust between the customer and the wireless service provider, who may, for example require a credit check to determine if the customer has a history of promptly paying his or her debts.
- devices are sold under these plans at a discounted rate, the discount being recouped over the term of a contract that the customer is required to enter. The contract binds the customer to purchase wireless service for a predetermined period of time.
- Such plans also generally charge a base rate for a certain number of included minutes of airtime and/or amounts of data that can be transferred. An increased rate is usually charged for additional minutes or data.
- Prepaid plans allow the customer to pay for the wireless service before it is used. This can allow customers who may have some negative credit history to receive wireless access without risk to the wireless service provider that the bill will go unpaid. Additionally, prepaid plans can be attractive to customers who do not wish to enter into a long term contract commitment. Such plans also can be used by those who want to avoid the risk of expending their allotment of base minutes and paying the increased rate thereafter.
- a customer Before a customer can enroll in an access plan, the customer must own a wireless device. These devices can include cell phones, PDAs, and BLACKBERRY® handheld devices, among others. Newer devices are popular not only for wireless convenience, but also due to novelty and fashion considerations. Modern devices allow customers to download ring tones and video games, and to purchase accessories and upgrades.
- Wireless devices can be found for sale in myriad locations such as, for example, mall kiosks, stores operated by wireless service providers, national office and computer supply stores, and other large national retailers. These locations may offer one or both of prepaid and postpaid plans with the devices that are offered for sale. The devices offered at these locations may be locked to a specific wireless service provider and also may be restricted under agreement between the reseller and the wireless service provider as to whether or not the devices can be activated as postpaid devices and/or prepaid devices.
- wireless access has made wireless devices a plausible target for theft.
- the thief avoids paying the upfront cost for the device itself and can call the wireless service provider to activate service for the device. Contract commitments are avoided as well.
- the thief may have difficulty activating the phone as a postpaid device due to credit history problems, but still may obtain prepaid service.
- postpaid phones are generally stored under a counter or locked away in a cabinet with only a sample phone on display, prepaid phones are often placed in boxes in customer-accessible areas. This can make prepaid phones more susceptible to theft by customers or even store employees. Not knowing that a new device has been stolen, the wireless provider can unwittingly allow the stolen device to access the network.
- GSM Global System for Mobile Communications
- IMEI International Mobile Equipment Identifier
- GSM service providers can maintain a database of IMEI's that categorizes the status of the IMEI. For example, three status levels can be used, white, black, and gray.
- a white-listed device could be a device that has no suspicious activity associated with it.
- a gray-listed device could have some history of suspicious activity, but still may be allowed to access the network, and a blacklisted device could be a known stolen or rogue device.
- Wireless service providers may or may not limit device access in this manner.
- the IMEI can be used, for example, when a paying customer's device is stolen from a car.
- the customer can call the GSM provider to report the stolen phone, and the GSM provider can blacklist the phone so that it is unable to access the network.
- the IMEI is known in this case because it was associated with the customer's account.
- GSM providers may share their IMEI lists so that a blacklisted phone cannot be used on any network and is thereby rendered useless. Some European wireless service providers limit access in this manner.
- This method of restricting stolen device usage is effective in the scenario presented above, but may not be as helpful in the case of a new device stolen from a retail store.
- the retailer may not have the IMEI on record. Or, the retailer may not notice that the device has been stolen for quite some time, allowing the thief to use it in the interim.
- the retailer does not have the resources to devote to informing the wireless service provider that the device has been stolen. For example, it may cost more to pay staff members to watch inventories closely enough to detect the theft, determine which device was stolen and its IMEI, and then call the wireless service provider to blacklist the device than it costs to simply replace the stolen device. Even more troublesome for retailers, is the case wherein a staff member steals a device.
- the various embodiments of the present disclosure overcome the shortcomings of the prior art by providing a reliable, convenient, and efficient way to identify a new device that has been stolen from a retail store, and to restrict the use of the stolen wireless device on a wireless network.
- the system includes a device management system for storing a purchase indicator with a unique device identifier in a computer readable memory.
- the device management system can be configured to receive the unique device identifier from a warehouse management system.
- the device management system further can be configured to receive an updated purchase indicator from a retail inventory system. If a device attempting to use the wireless network has a purchase indicator that shows that the device has not been sold, the system routes calls made by the device to a fraud management center.
- An embodiment of a method according to the present disclosure includes capturing a transmitted device identifier from a wireless device attempting to access a wireless network, comparing the captured device identifier to a list of identifiers stored in memory to find a purchase indicator for the device, and routing the device to a fraud management center if the purchase indicator shows that the device has not been purchased.
- Another embodiment of a method according to the present disclosure includes capturing a unique device identifier and a unique subscriber identifier from a wireless device attempting to access the network, comparing the captured device identifier with a device identifier stored with a subscriber identifier matching the captured subscriber identifier, and if there is no match, comparing the captured device identifier to a list of identifiers stored in memory to find a purchase indicator for the device, and routing the device to a fraud management center if the purchase indicator shows that the device has not been purchased.
- FIG. 1 is a diagram showing an exemplary environment for implementing exemplary systems and methods according to the present disclosure.
- FIG. 2 is a block diagram showing a system for creating and updating a purchase indicator for wireless devices sold at a retail location, according to an exemplary embodiment of the present disclosure.
- FIG. 3 is a block diagram showing a system for checking the purchase indicator of a device attempting to access the wireless network, according to an exemplary embodiment of the present disclosure.
- FIG. 4 is a flow chart depicting a method of detecting a stolen device attempting to access the wireless network, according to an exemplary embodiment of the present disclosure.
- FIG. 5 is a flow chart depicting a method of detecting a stolen device where the stolen device is attempting to access the wireless network using a valid subscriber identifier, according to an exemplary embodiment of the present disclosure.
- FIG. 1 illustrates an exemplary environment for implementing exemplary embodiments of systems and methods according to the present disclosure.
- a wireless device or in the embodiment depicted, a phone in a box (PIAB) 100 , is shown located at a warehouse 105 .
- the warehouse 105 can be a warehouse maintained by the wireless service provider, a manufacturer of wireless devices, a shipping company, or any other party that can store and/or ship wireless devices to resellers.
- a computer system 110 is located at the warehouse 105 .
- the computer system 110 can include an electronic reader 115 for reading the label 102 on the PIAB 100 .
- This electronic reader 115 is illustrated as a barcode scanner, but it should be understood that the electronic reader 115 can be a radio frequency identification (RFID) tag reader, or any other reader capable of scanning or interrogating a tag or label on the PIAB 100 .
- RFID radio frequency identification
- the label 102 shown on the PIAB 100 can be any type of electronically readable tag or label such as, for example, a barcode.
- the barcode scanner 115 reads the barcode 102 on the PIAB 100 and returns the information read to the computer system 110 .
- the information included on the barcode 102 can include details regarding the phone, including the manufacturer, model number, date of manufacture, and place of manufacture.
- the information also can include a unique device identifier. This identifier also can be printed on the device itself and stored in computer readable memory inside the device.
- GSM Global System for Mobile Communications
- IMEI International Mobile Equipment Identifier
- ESN Electronic Serial Number
- MAC Medium Access Control
- MEID Mobile Equipment Identity
- the computer system 110 communicates with the wireless service provider 120 .
- the communication 116 includes the IMEI of the PIAB 100 .
- the message sent can be formatted as an email, a text file, a Structured Query Language (SQL) database statement, SS7 signal, or any other wireless or wired format used for electronic communications.
- SQL Structured Query Language
- This communication can occur as the barcode 102 on the PIAB 100 is scanned, at timed intervals throughout a day, once a day in a nightly download, for example, or at any other interval.
- the communication can be initiated by the computer system 110 or the wireless service provider 120 .
- the IMEI transferred to the wireless service provider 120 is then stored in a database 125 where it is marked as corresponding to a device that has not been sold to the end user.
- the wireless service provider 120 can make this designation based on the origin of the information (i.e., a warehouse).
- the communication from the warehouse could include this designation, for example, in a comma delimited text file that includes values that correspond to fields in a database table, or in an SQL statement such as an INSERT statement.
- the PIAB 100 is then shipped to the retailer 130 , as indicated by dashed line 126 .
- the retailer 130 can be any reseller of the wireless devices.
- the retailer places the PIAB 100 on display for sale.
- the display can include a number of PIAB's 100 .
- Such a display can advertise the PIAB's 100 as prepaid phones (user pays for wireless service upfront) or as postpaid phones (user periodically pays for wireless service after airtime has been used).
- each of the PIAB's 100 on display has an IMEI that is marked as unsold in the database 125 .
- the customer 132 picks up a PIAB 100 and proceeds to the checkout counter to purchase the PIAB 100 .
- the barcode 102 on the PIAB 100 is scanned by the retailer's point of sale computer 135 using the electronic reader 140 .
- the electronic reader 140 can be any type of reader known in the art.
- the customer 132 pays for the PIAB 100 .
- the retailer's point of sale computer 135 communicates with the wireless service provider 120 .
- the communication 136 includes the IMEI of the PIAB 100 that was just purchased.
- the communication 136 indicates that the PIAB 100 has now been sold.
- the information can be sent in any of the methods noted above for sending the communication 116 .
- the timing of the communication 136 it may be preferable to send the information at the time the PIAB 100 is purchased, since the customer 132 may wish to activate the phone immediately.
- the database 125 is updated to reflect that the IMEI transferred to the wireless service provider 120 corresponds to a phone that has been sold.
- the customer 132 leaves the store with the purchased phone 100 a .
- a thief 145 absconds from the retailer 130 with a PIAB 100 .
- the customer 132 opens the box and removes the purchased phone 100 a .
- the purchased phone 100 a is turned on and the customer 132 attempts to activate the purchased phone 100 a .
- the purchased phone 100 a Upon registering with the wireless network, the purchased phone 100 a transmits its IMEI.
- the database 125 is then queried for the transmitted IMEI.
- the query returns a purchase identifier from the database indicating a sold status for the purchased phone 100 a corresponding to that IMEI.
- the purchased phone 100 a is activated on the network.
- the customer 132 attempts to place a call, the phone call is routed as dialed.
- the thief 145 opens the box containing the stolen phone 100 b and attempts to activate the stolen phone 100 b .
- the stolen phone 100 b sends its IMEI to the wireless service provider 120 .
- the IMEI is captured by the wireless service provider 120 .
- the database 125 is queried for the captured IMEI and the query returns a purchase identifier indicating a not sold status for the stolen phone 100 b .
- the thief 145 attempts to place a call on the network, the call is not routed as dialed.
- the call can be routed, for example, to a wireless service provider fraud management center.
- Table 1 provides an example of a data association between a purchase indicator and a unique device identifier.
- an association means a logical link or relationship created in a computer memory, for example, in a record in a computer database such as, for example, the database 125 .
- the first column represents the location of the device in the stream of commerce.
- the second column represents the unique device identifier and the third column shows a purchase indicator that indicates whether the device has been marked as sold by a reseller.
- This data can be stored as a record by the wireless service provider 120 in a separate table having the unique device ID as its primary key.
- the purchase indicator can be stored in an existing table containing device, account, and/or subscriber information.
- Some retailers may not wish to participate in the stolen device restriction program due to cost and/or convenience issues regarding the program's implementation. Some may decide to risk having a thief leave their premises with an operational phone. If all phones shipped from the warehouse are marked NS and some non-participating retailers exist, then the device would not be updated at the point of sale. The purchaser would not be able to activate the phone. Since all retailers may not wish to participate in the program, it can be preferable to associate additional data with the unique device identifier. This can provide consistency at the warehouse and give the wireless service provider additional options for tracking the sale of wireless devices.
- Table 2 provides an example of a data format that can be used to allow retailers to choose whether to participate in the program, without preventing activation of devices sold by retailers choosing not to participate in the program.
- the unique device ID is associated in Table 2 with seven items of data: Allowed Activation, Retailer Participation Type, Purchase Indicator, Active Status, Shipped to Code, Activated by Code, and Activated As.
- the Allowed Activation Type can either be PO for prepaid only, or AA for any activation. This indicates the type of billing arrangement that the wireless service provider will allow for the associated device.
- the Retailer Participation Type can either be P for participating, NP for non-participating, or PP for participating postpaid.
- the Retailer Participation Type field indicates whether or not the retailer that the phone is being shipped to participates in the stolen phone restriction program.
- the Purchase Indicator can be S for sold, or NS for not sold.
- the Active Status indicates whether or not the phone as been activated on the wireless network for service. It can be A for active or I for inactive.
- the Shipped to Code is an identifier for the retailer intended to receive the device from the warehouse.
- the Activated By Code is used to indicate the entity that activated the device. After activation by the retailer, for example, this can be the same as the Shipped to Code. Another code can be used to indicate that an individual activated the phone by calling the wireless service provider.
- the Activated As field indicates the manner of billing that was set up at the time the phone was activated.
- Table 3 shows initial values for a prepaid device to be shipped from the warehouse 105 according to the data format presented in Table 2.
- the allowed activation is prepaid only, the participating type is participating, and the purchase indicator is set to NS (not sold).
- the Active Status is initially set to I since the phone has not yet been activated.
- the Shipped to Code is listed as “ABC,” which is meant to indicate an arbitrary retailer that participates in the stolen phone restriction program.
- the Activated by Code and Activated As fields are not populated since the device had not been activated.
- FIG. 2 shows a system 200 for creating and updating a purchase indicator for wireless devices sold at a retail location.
- a warehouse management system 205 communicates with one or more package scanners 210 .
- Each of the package scanners 210 can have a processor 211 , a computer readable memory 212 , an electronic reader 213 and an input/output system 214 .
- the package scanners 210 can communicate wirelessly with the warehouse management system 205 . Although a wireless embodiment is shown, the package scanners 210 can be wired to the warehouse management system 205 , and can use a processor and memory of the warehouse management system 205 in lieu of being standalone units.
- the electronic reader 213 can be any type of reader capable of capturing data from a label or tag and providing this data to the processor 211 of the package scanner 210 .
- Examples of such readers 213 are optical readers than can scan data from barcodes and radio frequency identification tag readers.
- the electronic reader 213 is used to read the label 102 , shown, in this example, as a barcode attached to a PIAB 100 .
- the barcode 102 contains a unique device identifier such as an IMEI. This information is provided to the processor 211 .
- the package scanner 210 can include a keyboard or other input device 214 to allow a user to enter the destination of the PIAB 100 where the device is to be shipped.
- the user also can enter parameters such as an allowed activation, and a participation type.
- the user can enter a shipped device configuration which will set the other values accordingly.
- a shipped to code can be entered, which can have the values preset to meet a recipient's saved profile.
- the package scanner 210 can be used to capture data and set parameters for a single PIAB 100 or a series of PIAB's 100 .
- the package scanner 210 can be set to scan thirty phones that are to be shipped to retailer ABC.
- the package scanner 210 can have a saved profile for retailer ABC (or such a profile can be downloaded from the warehouse management system 205 ). By choosing “ship to code” “ABC,” the package scanner 210 can set “allowed activation” to “PO” and “participation type” to “P.” The “purchase indicator” will be set to “NS” and “active status” to “I.”
- the package scanner 210 then can instruct a user through a package scanner display or other output device 214 to scan the first item.
- the user can scan an item and the package scanner 210 can instruct the user to scan another item or press a button to indicate that no more packages with the current settings are to be scanned.
- Data for the scanned PIAB's 100 can be stored in the memory 212 of the package scanner 210 and then transferred to the warehouse management system 205 .
- the warehouse management system 205 can include a database for storing shipment information for shipments from the warehouse.
- the unique device identifiers for the scanned PIAB's 100 and any associated information is transferred over the network 225 from the warehouse management system 205 to the device management system 220 .
- the network 225 can be a private network or a public network such as the Internet.
- the device management system 220 can include a database where the PIAB 100 information is stored.
- the retailer inventory and sale system 230 can communicate with the device management system 220 over the same network 225 or another network (not shown). For a large retail chain that includes many stores, the inventory and sale system 230 can be connected to a plurality of stores 235 , 236 , 237 . These stores can have registers R 1 -RN Each register R 1 -RN includes an electronic reader that is capable of reading the unique device identifier from a PIAB 100 .
- a customer takes the device in its box to the checkout counter where is it is purchased at a register.
- the register reads the unique device identifier when the device is scanned and sends an electronic communication to the inventory and sale system 230 .
- the inventory and sale system 230 can then send an electronic message over the network 225 to the device management system 220 that includes the unique device identifier of the PIAB 100 to indicate that the device has been sold.
- This communication preferably happens soon after the purchase as the customer may want to activate the phone immediately following the purchase.
- the retail inventory and sale system 230 may be located at the same location as the register.
- the device management system 220 can update its database containing the unique device identifier (IMEI for the GSM example described above) to change the purchase indicator to from “NS” for “not sold” to “S” for “sold.”
- IMEI unique device identifier
- the purchaser of the phone can activate the phone without being routed to a fraud management center once this has occurred.
- the Active Status can be updated from inactive “I” to active “A.”
- the purchase indicator remains set to “NS” in the device management system.
- the device management system 220 can receive a message from the warehouse management system 205 containing the unique device identifiers of PIAB's 100 that have no record of being shipped and have not recently appeared in an inventory update, for example, an inventory scan of all PIAB's 100 at the warehouse.
- the device management system 220 can be configured to set the purchase indicator of these unique device identifiers to “NS.” This embodiment can be used to deter theft at the warehouse.
- FIG. 3 shows a system 300 for checking the purchase indicator of a device 305 attempting to access a wireless network 310 .
- the wireless network 310 includes one or more base stations 315 , 316 and one or more base station controllers (BSC) 320 , 321 that are connected to or are otherwise in communication with a mobile switching center (MSC) 325 .
- the wireless network 310 includes a device management system 220 and can include a fraud management center 330 connected to the MSC 325 .
- the MSC 325 is also connected to the public switched telephone network (PSTN) 335 .
- PSTN public switched telephone network
- the fraud management center 330 alternatively can be connected to the PSTN 335 .
- a house 340 having telephone access is connected to the PSTN 335 .
- the device 305 attempts to place a call on the wireless network 310 .
- the device 305 transmits its unique device identifier, among other data, to the base station 315 .
- the BSC 320 captures the identifier and forwards it to the MSC 325 .
- the MSC 325 forwards the identifier to the device management system 220 .
- the identifier can be passed, for example, in a call detail record (CDR).
- CDR call detail record
- the device management system 220 checks the purchase indicator to see of the device 305 is marked as sold. If the device 305 is marked as sold, the device management system 220 can instruct the MSC 325 to route the call as dialed, for example to the house 340 or to another wireless device on the wireless network 310 .
- the device management system 220 can instruct the MSC 325 to route the call to the fraud management center 330 .
- Representatives in the fraud management center 330 can inform the caller that the device 305 is listed as unsold and request proof of purchase. If the caller is unable to provide proof of purchase by, for example, sending a copy of the receipt for the phone via facsimile, the caller is instructed to contact the place of purchase to resolve the issue.
- representatives in the fraud management center 330 can update the device management system 220 to change the purchase indicator for the unique device identifier associated with the device 305 to “S” for sold or perform other operations in order to override the routing of calls from the device 305 to the fraud management center 330 in the future.
- FIG. 4 is a flowchart describing a method 400 of detecting a stolen device attempting to access the wireless network according to the present disclosure.
- the method 400 begins at step 405 when a wireless device attempts to place a call on the wireless network.
- the unique device identifier is captured from the device attempting to place the call.
- the device management system is searched for a matching identifier.
- the outcome of decision block 420 depends on whether or not a matching identifier is found. If no matching identifier is found, the call is routed as dialed and the method 400 ends at 425 . If no identifier is found, the phone can be, for example, an older phone that was sold before systems and methods of the present disclosure were implemented. The call is routed as dialed so as not to interfere with the operation of these devices.
- operation continues to decision block 430 where the “participation type” field is checked to see if the device associated with the identifier is marked as having been shipped to a participating retailer. If not, then the call is routed as dialed and the method 400 ends at 425 . If the device is marked as having been shipped to a participating retailer the method 400 continues to decision block 435 .
- the purchase indicator for the device associated with the unique device identifier is checked. If the purchase indicator shows that the device has been sold, the call is routed as dialed and the method 400 ends at step 425 . If the purchase indicator shows that the device has not been sold, the method 400 ends at 440 where the call is routed to a fraud management center.
- FIG. 5 shows a method 500 of detecting a stolen device where the stolen device is attempting to access the wireless network using a valid subscriber identifier.
- wireless networks also can utilize a unique subscriber identifier.
- SIM subscriber identity module
- the SIM card contains the international mobile subscriber identifier (IMSI) which is used to associate a billing account with a wireless subscriber.
- IMSI international mobile subscriber identifier
- a SIM card that is associated with an active wireless account can be removed from one phone and placed in another compatible phone. This allows a subscriber to place wireless calls to and/or from the second phone that are billed to the account associated with the SIM card.
- an account management system is included in the wireless network that contains an association between a subscriber, an account, and a subscriber identification number (such as an IMSI located on the subscriber's SIM card).
- the account management system also can include an association between a subscriber identification number and a device identification number used by the subscriber.
- the device management system includes such an association.
- the method 500 begins at 510 where a wireless device attempts to place a call on a wireless network.
- the network captures a unique device identifier and a unique subscriber identifier from the wireless device at 515 .
- the account management system is searched for the captured subscriber identifier. Operation proceeds to decision step 525 .
- the outcome of decision step 525 depends on whether or not the subscriber identifier was located in the account management system. If the subscriber identifier was not found the device is not allowed to place the call, and the method 500 stops at 530 .
- the subscriber identity can be determined from account information as is known in the art. If no subscriber identifier is found in the account management system then no one can be billed for the call. The call is therefore not allowed.
- a phone placing such a call can be locked, or the call can be forwarded to a fraud management group, a recorded message, or be handled as otherwise known in the art.
- processing continues to 535 where the account management system is queried to determine if the device identifier associated with the subscriber identifier in the account management system matches the device identifier captured from the wireless device attempting the call. Alternatively, the device management system can be checked for this information if the association is stored there. It should be understood that in some embodiments the account management system and the device management system may be integrated, for example, on the same server, or in the same database. If the device identifiers match, the call is routed as dialed and the method 500 ends at 540 .
- the “participation type” field corresponding to the captured device identifier is checked in the device management system to see if the device is marked as having been shipped to a participating retailer. If it is not, then the method 500 ends at 540 and the call is routed as dialed. If the device is marked as having been sold to a participating retailer, then processing continues to 550 .
- the purchase indicator for the device is checked to see if it is marked as sold or not sold. If the purchase indicator shows that the device has been sold, the method 500 ends at 540 and the call is routed as dialed. If the purchase indicator shows that the device has not been sold, the call is routed to a fraud management center at 555 .
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application is a continuation of U.S. application Ser. No. 11/264,647, filed Oct. 31, 2005, the entirety of which is herein incorporated by reference.
- This disclosure relates generally to the field of wireless services and, more particularly, to restrictions on the use of stolen wireless devices on a wireless network.
- Wireless telephone service has gained widespread acceptance and popularity throughout much of the modern world. Advanced technologies on the horizon will speed the delivery of data to and from mobile devices as well as make voice calls more reliable, further increasing the desirability of having access to wireless services. Many individuals are deciding to discontinue landline service altogether, relying solely on wireless service for telephone voice communications.
- To meet the public demand for wireless access, wireless service providers have developed myriad service plans. These service plans generally fall into one of two categories, postpaid or prepaid. Postpaid access plans generally allow the mobile customer to use airtime during a period for which the customer is billed at a later date. Enrollment in such a plan can require a level of trust between the customer and the wireless service provider, who may, for example require a credit check to determine if the customer has a history of promptly paying his or her debts. Generally, devices are sold under these plans at a discounted rate, the discount being recouped over the term of a contract that the customer is required to enter. The contract binds the customer to purchase wireless service for a predetermined period of time. Such plans also generally charge a base rate for a certain number of included minutes of airtime and/or amounts of data that can be transferred. An increased rate is usually charged for additional minutes or data.
- Prepaid plans, on the other hand, allow the customer to pay for the wireless service before it is used. This can allow customers who may have some negative credit history to receive wireless access without risk to the wireless service provider that the bill will go unpaid. Additionally, prepaid plans can be attractive to customers who do not wish to enter into a long term contract commitment. Such plans also can be used by those who want to avoid the risk of expending their allotment of base minutes and paying the increased rate thereafter.
- Of course, before a customer can enroll in an access plan, the customer must own a wireless device. These devices can include cell phones, PDAs, and BLACKBERRY® handheld devices, among others. Newer devices are popular not only for wireless convenience, but also due to novelty and fashion considerations. Modern devices allow customers to download ring tones and video games, and to purchase accessories and upgrades.
- Wireless devices can be found for sale in myriad locations such as, for example, mall kiosks, stores operated by wireless service providers, national office and computer supply stores, and other large national retailers. These locations may offer one or both of prepaid and postpaid plans with the devices that are offered for sale. The devices offered at these locations may be locked to a specific wireless service provider and also may be restricted under agreement between the reseller and the wireless service provider as to whether or not the devices can be activated as postpaid devices and/or prepaid devices.
- Unfortunately, the popularity of wireless access has made wireless devices a tempting target for theft. By stealing a device, the thief avoids paying the upfront cost for the device itself and can call the wireless service provider to activate service for the device. Contract commitments are avoided as well. The thief may have difficulty activating the phone as a postpaid device due to credit history problems, but still may obtain prepaid service. Where postpaid phones are generally stored under a counter or locked away in a cabinet with only a sample phone on display, prepaid phones are often placed in boxes in customer-accessible areas. This can make prepaid phones more susceptible to theft by customers or even store employees. Not knowing that a new device has been stolen, the wireless provider can unwittingly allow the stolen device to access the network.
- Some wireless architectures include provisions for combating theft. For example, the Global System for Mobile Communications (GSM) standard defines a unique device identifier for all compliant phones. This identifier is called an International Mobile Equipment Identifier (IMEI). GSM service providers can maintain a database of IMEI's that categorizes the status of the IMEI. For example, three status levels can be used, white, black, and gray. A white-listed device could be a device that has no suspicious activity associated with it. A gray-listed device could have some history of suspicious activity, but still may be allowed to access the network, and a blacklisted device could be a known stolen or rogue device. Wireless service providers may or may not limit device access in this manner.
- The IMEI can be used, for example, when a paying customer's device is stolen from a car. The customer can call the GSM provider to report the stolen phone, and the GSM provider can blacklist the phone so that it is unable to access the network. The IMEI is known in this case because it was associated with the customer's account. GSM providers may share their IMEI lists so that a blacklisted phone cannot be used on any network and is thereby rendered useless. Some European wireless service providers limit access in this manner.
- This method of restricting stolen device usage is effective in the scenario presented above, but may not be as helpful in the case of a new device stolen from a retail store. In the latter case, the retailer may not have the IMEI on record. Or, the retailer may not notice that the device has been stolen for quite some time, allowing the thief to use it in the interim. It also is possible that the retailer does not have the resources to devote to informing the wireless service provider that the device has been stolen. For example, it may cost more to pay staff members to watch inventories closely enough to detect the theft, determine which device was stolen and its IMEI, and then call the wireless service provider to blacklist the device than it costs to simply replace the stolen device. Even more troublesome for retailers, is the case wherein a staff member steals a device. Some retailers, indeed, may decide that due to the risk of theft, it is not worth offering the devices for sale at all. This is an unfortunate situation for the wireless service provider, the retailer, and honest paying customers.
- The various embodiments of the present disclosure overcome the shortcomings of the prior art by providing a reliable, convenient, and efficient way to identify a new device that has been stolen from a retail store, and to restrict the use of the stolen wireless device on a wireless network.
- In one embodiment, the system includes a device management system for storing a purchase indicator with a unique device identifier in a computer readable memory. The device management system can be configured to receive the unique device identifier from a warehouse management system. The device management system further can be configured to receive an updated purchase indicator from a retail inventory system. If a device attempting to use the wireless network has a purchase indicator that shows that the device has not been sold, the system routes calls made by the device to a fraud management center.
- An embodiment of a method according to the present disclosure includes capturing a transmitted device identifier from a wireless device attempting to access a wireless network, comparing the captured device identifier to a list of identifiers stored in memory to find a purchase indicator for the device, and routing the device to a fraud management center if the purchase indicator shows that the device has not been purchased.
- Another embodiment of a method according to the present disclosure includes capturing a unique device identifier and a unique subscriber identifier from a wireless device attempting to access the network, comparing the captured device identifier with a device identifier stored with a subscriber identifier matching the captured subscriber identifier, and if there is no match, comparing the captured device identifier to a list of identifiers stored in memory to find a purchase indicator for the device, and routing the device to a fraud management center if the purchase indicator shows that the device has not been purchased.
- The foregoing has broadly outlined some of the aspects and features of the present disclosure, which should be construed to be merely illustrative of various potential applications of the disclosure. Other beneficial results can be obtained by applying the disclosed information in a different manner or by combining various aspects of the disclosed embodiments. Accordingly, other aspects and a more comprehensive understanding of the disclosure may be obtained by referring to the detailed description of the exemplary embodiments taken in conjunction with the accompanying drawings, in addition to the scope of the disclosure defined by the claims.
-
FIG. 1 is a diagram showing an exemplary environment for implementing exemplary systems and methods according to the present disclosure. -
FIG. 2 is a block diagram showing a system for creating and updating a purchase indicator for wireless devices sold at a retail location, according to an exemplary embodiment of the present disclosure. -
FIG. 3 is a block diagram showing a system for checking the purchase indicator of a device attempting to access the wireless network, according to an exemplary embodiment of the present disclosure. -
FIG. 4 is a flow chart depicting a method of detecting a stolen device attempting to access the wireless network, according to an exemplary embodiment of the present disclosure. -
FIG. 5 is a flow chart depicting a method of detecting a stolen device where the stolen device is attempting to access the wireless network using a valid subscriber identifier, according to an exemplary embodiment of the present disclosure. - As required, detailed embodiments of the present disclosure are disclosed herein. It will be understood that the disclosed embodiments are merely examples to illustrate aspects of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale, and some features may be exaggerated or minimized to show details of particular components. In other instances, well-known materials or methods have not been described in detail to avoid obscuring the systems and methods described in the present disclosure. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but as a basis for the claims and for teaching one skilled in the art to variously employ the present disclosure.
- Referring now to the drawings, in which like numerals indicate like elements throughout the several views,
FIG. 1 illustrates an exemplary environment for implementing exemplary embodiments of systems and methods according to the present disclosure. A wireless device, or in the embodiment depicted, a phone in a box (PIAB) 100, is shown located at awarehouse 105. Thewarehouse 105 can be a warehouse maintained by the wireless service provider, a manufacturer of wireless devices, a shipping company, or any other party that can store and/or ship wireless devices to resellers. - A
computer system 110 is located at thewarehouse 105. Thecomputer system 110 can include anelectronic reader 115 for reading thelabel 102 on thePIAB 100. Thiselectronic reader 115 is illustrated as a barcode scanner, but it should be understood that theelectronic reader 115 can be a radio frequency identification (RFID) tag reader, or any other reader capable of scanning or interrogating a tag or label on thePIAB 100. Likewise, thelabel 102 shown on thePIAB 100 can be any type of electronically readable tag or label such as, for example, a barcode. Thebarcode scanner 115 reads thebarcode 102 on thePIAB 100 and returns the information read to thecomputer system 110. - The information included on the
barcode 102 can include details regarding the phone, including the manufacturer, model number, date of manufacture, and place of manufacture. The information also can include a unique device identifier. This identifier also can be printed on the device itself and stored in computer readable memory inside the device. - For purposes of illustration, the Global System for Mobile Communications (GSM) standard device identifier, International Mobile Equipment Identifier (IMEI), will be used throughout the following discussion. However, one skilled in the art will understand that other unique device identifiers can be used such as an Electronic Serial Number (ESN), a Medium Access Control (MAC) Address, a Mobile Equipment Identity (MEID), or any other device identifier known in the art.
- The
computer system 110 communicates with thewireless service provider 120. Thecommunication 116, includes the IMEI of thePIAB 100. The message sent can be formatted as an email, a text file, a Structured Query Language (SQL) database statement, SS7 signal, or any other wireless or wired format used for electronic communications. This communication can occur as thebarcode 102 on thePIAB 100 is scanned, at timed intervals throughout a day, once a day in a nightly download, for example, or at any other interval. The communication can be initiated by thecomputer system 110 or thewireless service provider 120. - The IMEI transferred to the
wireless service provider 120 is then stored in adatabase 125 where it is marked as corresponding to a device that has not been sold to the end user. Thewireless service provider 120 can make this designation based on the origin of the information (i.e., a warehouse). Alternatively, the communication from the warehouse could include this designation, for example, in a comma delimited text file that includes values that correspond to fields in a database table, or in an SQL statement such as an INSERT statement. - The
PIAB 100 is then shipped to theretailer 130, as indicated by dashedline 126. Theretailer 130 can be any reseller of the wireless devices. The retailer places thePIAB 100 on display for sale. The display can include a number of PIAB's 100. Such a display can advertise the PIAB's 100 as prepaid phones (user pays for wireless service upfront) or as postpaid phones (user periodically pays for wireless service after airtime has been used). At this point, each of the PIAB's 100 on display has an IMEI that is marked as unsold in thedatabase 125. - The
customer 132 picks up aPIAB 100 and proceeds to the checkout counter to purchase thePIAB 100. At checkout, thebarcode 102 on thePIAB 100 is scanned by the retailer's point ofsale computer 135 using theelectronic reader 140. As mentioned previously with regard to theelectronic reader 115, theelectronic reader 140 can be any type of reader known in the art. Thecustomer 132 pays for thePIAB 100. The retailer's point ofsale computer 135 communicates with thewireless service provider 120. Thecommunication 136 includes the IMEI of thePIAB 100 that was just purchased. Thecommunication 136 indicates that thePIAB 100 has now been sold. The information can be sent in any of the methods noted above for sending thecommunication 116. In this case, however, regarding the timing of thecommunication 136, it may be preferable to send the information at the time thePIAB 100 is purchased, since thecustomer 132 may wish to activate the phone immediately. Thedatabase 125 is updated to reflect that the IMEI transferred to thewireless service provider 120 corresponds to a phone that has been sold. - In the illustrated example, the
customer 132 leaves the store with the purchasedphone 100 a. Instead of purchasing aPIAB 100 on display, athief 145 absconds from theretailer 130 with aPIAB 100. - The
customer 132 opens the box and removes the purchasedphone 100 a. The purchasedphone 100 a is turned on and thecustomer 132 attempts to activate the purchasedphone 100 a. Upon registering with the wireless network, the purchasedphone 100 a transmits its IMEI. Thedatabase 125 is then queried for the transmitted IMEI. The query returns a purchase identifier from the database indicating a sold status for the purchasedphone 100 a corresponding to that IMEI. The purchasedphone 100 a is activated on the network. When thecustomer 132 attempts to place a call, the phone call is routed as dialed. - The
thief 145 opens the box containing the stolenphone 100 b and attempts to activate the stolenphone 100 b. The stolenphone 100 b sends its IMEI to thewireless service provider 120. The IMEI is captured by thewireless service provider 120. Thedatabase 125 is queried for the captured IMEI and the query returns a purchase identifier indicating a not sold status for the stolenphone 100 b. When thethief 145 attempts to place a call on the network, the call is not routed as dialed. The call can be routed, for example, to a wireless service provider fraud management center. -
TABLE 1 Location of device in Purchase commerce stream Unique Device ID Indicator At warehouse and before 123456789012345 NS sale to end user. After sale to end user 123456789012345 S - Table 1 provides an example of a data association between a purchase indicator and a unique device identifier. In this context, an association means a logical link or relationship created in a computer memory, for example, in a record in a computer database such as, for example, the
database 125. The first column represents the location of the device in the stream of commerce. The second column represents the unique device identifier and the third column shows a purchase indicator that indicates whether the device has been marked as sold by a reseller. This data can be stored as a record by thewireless service provider 120 in a separate table having the unique device ID as its primary key. Alternatively, the purchase indicator can be stored in an existing table containing device, account, and/or subscriber information. - Some retailers, however, may not wish to participate in the stolen device restriction program due to cost and/or convenience issues regarding the program's implementation. Some may decide to risk having a thief leave their premises with an operational phone. If all phones shipped from the warehouse are marked NS and some non-participating retailers exist, then the device would not be updated at the point of sale. The purchaser would not be able to activate the phone. Since all retailers may not wish to participate in the program, it can be preferable to associate additional data with the unique device identifier. This can provide consistency at the warehouse and give the wireless service provider additional options for tracking the sale of wireless devices.
-
TABLE 2 Retailer Allowed Participation Purchase Active Shipped to Activated Activated Unique Device ID Activation Type Indicator Status Code by Code As 123456789012345 PO—Prepaid P—Participating S—Sold A—Active Code Code Pre—Prepaid Only NP—Non- NS—Not I—Inactive Identifying Identifying Activation AA—Any Participating Sold Recipient of Activating Post—Postpaid Activation PP—Participating device Entity Activation. Postpaid - Table 2 provides an example of a data format that can be used to allow retailers to choose whether to participate in the program, without preventing activation of devices sold by retailers choosing not to participate in the program. The unique device ID is associated in Table 2 with seven items of data: Allowed Activation, Retailer Participation Type, Purchase Indicator, Active Status, Shipped to Code, Activated by Code, and Activated As. The Allowed Activation Type can either be PO for prepaid only, or AA for any activation. This indicates the type of billing arrangement that the wireless service provider will allow for the associated device. The Retailer Participation Type can either be P for participating, NP for non-participating, or PP for participating postpaid. The Retailer Participation Type field indicates whether or not the retailer that the phone is being shipped to participates in the stolen phone restriction program. The Purchase Indicator can be S for sold, or NS for not sold. The Active Status indicates whether or not the phone as been activated on the wireless network for service. It can be A for active or I for inactive. The Shipped to Code is an identifier for the retailer intended to receive the device from the warehouse. The Activated By Code is used to indicate the entity that activated the device. After activation by the retailer, for example, this can be the same as the Shipped to Code. Another code can be used to indicate that an individual activated the phone by calling the wireless service provider. The Activated As field indicates the manner of billing that was set up at the time the phone was activated.
-
TABLE 3 Shipped Device Allowed Participation Purchase Active Shipped Activated Activated Configuration Activation Type Indicator Status to Code by Code As Participating PO P NS I ABC — — Prepaid - Table 3 shows initial values for a prepaid device to be shipped from the
warehouse 105 according to the data format presented in Table 2. The allowed activation is prepaid only, the participating type is participating, and the purchase indicator is set to NS (not sold). The Active Status is initially set to I since the phone has not yet been activated. The Shipped to Code is listed as “ABC,” which is meant to indicate an arbitrary retailer that participates in the stolen phone restriction program. The Activated by Code and Activated As fields are not populated since the device had not been activated. -
FIG. 2 shows asystem 200 for creating and updating a purchase indicator for wireless devices sold at a retail location. Awarehouse management system 205 communicates with one ormore package scanners 210. Each of thepackage scanners 210 can have aprocessor 211, a computerreadable memory 212, anelectronic reader 213 and an input/output system 214. Thepackage scanners 210 can communicate wirelessly with thewarehouse management system 205. Although a wireless embodiment is shown, thepackage scanners 210 can be wired to thewarehouse management system 205, and can use a processor and memory of thewarehouse management system 205 in lieu of being standalone units. - The
electronic reader 213 can be any type of reader capable of capturing data from a label or tag and providing this data to theprocessor 211 of thepackage scanner 210. Examples ofsuch readers 213 are optical readers than can scan data from barcodes and radio frequency identification tag readers. One of skill in the art will recognize that the use of other readers is within the scope of the present disclosure. Theelectronic reader 213 is used to read thelabel 102, shown, in this example, as a barcode attached to aPIAB 100. Thebarcode 102 contains a unique device identifier such as an IMEI. This information is provided to theprocessor 211. - The
package scanner 210 can include a keyboard orother input device 214 to allow a user to enter the destination of thePIAB 100 where the device is to be shipped. The user also can enter parameters such as an allowed activation, and a participation type. Alternatively, the user can enter a shipped device configuration which will set the other values accordingly. A shipped to code can be entered, which can have the values preset to meet a recipient's saved profile. Thepackage scanner 210 can be used to capture data and set parameters for asingle PIAB 100 or a series of PIAB's 100. For example, thepackage scanner 210 can be set to scan thirty phones that are to be shipped to retailer ABC. Thepackage scanner 210 can have a saved profile for retailer ABC (or such a profile can be downloaded from the warehouse management system 205). By choosing “ship to code” “ABC,” thepackage scanner 210 can set “allowed activation” to “PO” and “participation type” to “P.” The “purchase indicator” will be set to “NS” and “active status” to “I.” - The
package scanner 210 then can instruct a user through a package scanner display orother output device 214 to scan the first item. The user can scan an item and thepackage scanner 210 can instruct the user to scan another item or press a button to indicate that no more packages with the current settings are to be scanned. - Data for the scanned PIAB's 100 can be stored in the
memory 212 of thepackage scanner 210 and then transferred to thewarehouse management system 205. Thewarehouse management system 205 can include a database for storing shipment information for shipments from the warehouse. - Either immediately, or through irregular or periodic updates initiated by either the
warehouse management system 205 or the wireless service providerdevice management system 220, the unique device identifiers for the scanned PIAB's 100 and any associated information is transferred over thenetwork 225 from thewarehouse management system 205 to thedevice management system 220. Thenetwork 225 can be a private network or a public network such as the Internet. Thedevice management system 220 can include a database where thePIAB 100 information is stored. - The retailer inventory and
sale system 230 can communicate with thedevice management system 220 over thesame network 225 or another network (not shown). For a large retail chain that includes many stores, the inventory andsale system 230 can be connected to a plurality ofstores PIAB 100. - In the scenario of a proper purchase, a customer takes the device in its box to the checkout counter where is it is purchased at a register. The register reads the unique device identifier when the device is scanned and sends an electronic communication to the inventory and
sale system 230. The inventory andsale system 230 can then send an electronic message over thenetwork 225 to thedevice management system 220 that includes the unique device identifier of thePIAB 100 to indicate that the device has been sold. This communication preferably happens soon after the purchase as the customer may want to activate the phone immediately following the purchase. It should be understood that in some embodiments, the retail inventory andsale system 230 may be located at the same location as the register. Thedevice management system 220 can update its database containing the unique device identifier (IMEI for the GSM example described above) to change the purchase indicator to from “NS” for “not sold” to “S” for “sold.” The purchaser of the phone can activate the phone without being routed to a fraud management center once this has occurred. Once the phone is activated, the Active Status can be updated from inactive “I” to active “A.” - In the case of a theft, the purchase indicator remains set to “NS” in the device management system.
- In one embodiment of the present disclosure, the
device management system 220 can receive a message from thewarehouse management system 205 containing the unique device identifiers of PIAB's 100 that have no record of being shipped and have not recently appeared in an inventory update, for example, an inventory scan of all PIAB's 100 at the warehouse. Thedevice management system 220 can be configured to set the purchase indicator of these unique device identifiers to “NS.” This embodiment can be used to deter theft at the warehouse. -
FIG. 3 shows asystem 300 for checking the purchase indicator of adevice 305 attempting to access awireless network 310. Thewireless network 310 includes one ormore base stations wireless network 310 includes adevice management system 220 and can include afraud management center 330 connected to theMSC 325. TheMSC 325 is also connected to the public switched telephone network (PSTN) 335. Thefraud management center 330 alternatively can be connected to thePSTN 335. Ahouse 340 having telephone access is connected to thePSTN 335. - The
device 305 attempts to place a call on thewireless network 310. In placing the call, thedevice 305 transmits its unique device identifier, among other data, to thebase station 315. TheBSC 320 captures the identifier and forwards it to theMSC 325. TheMSC 325 forwards the identifier to thedevice management system 220. The identifier can be passed, for example, in a call detail record (CDR). Thedevice management system 220 checks the purchase indicator to see of thedevice 305 is marked as sold. If thedevice 305 is marked as sold, thedevice management system 220 can instruct theMSC 325 to route the call as dialed, for example to thehouse 340 or to another wireless device on thewireless network 310. - If the purchase indicator corresponding to the unique device identifier shows that the
device 305 has not been sold, thedevice management system 220 can instruct theMSC 325 to route the call to thefraud management center 330. Representatives in thefraud management center 330 can inform the caller that thedevice 305 is listed as unsold and request proof of purchase. If the caller is unable to provide proof of purchase by, for example, sending a copy of the receipt for the phone via facsimile, the caller is instructed to contact the place of purchase to resolve the issue. If the caller can provide proof of purchase, representatives in thefraud management center 330 can update thedevice management system 220 to change the purchase indicator for the unique device identifier associated with thedevice 305 to “S” for sold or perform other operations in order to override the routing of calls from thedevice 305 to thefraud management center 330 in the future. -
FIG. 4 is a flowchart describing a method 400 of detecting a stolen device attempting to access the wireless network according to the present disclosure. The method 400 begins at step 405 when a wireless device attempts to place a call on the wireless network. At 410 the unique device identifier is captured from the device attempting to place the call. At 415 the device management system is searched for a matching identifier. The outcome of decision block 420 depends on whether or not a matching identifier is found. If no matching identifier is found, the call is routed as dialed and the method 400 ends at 425. If no identifier is found, the phone can be, for example, an older phone that was sold before systems and methods of the present disclosure were implemented. The call is routed as dialed so as not to interfere with the operation of these devices. - If the identifier is found in the device management system, operation continues to decision block 430 where the “participation type” field is checked to see if the device associated with the identifier is marked as having been shipped to a participating retailer. If not, then the call is routed as dialed and the method 400 ends at 425. If the device is marked as having been shipped to a participating retailer the method 400 continues to decision block 435.
- At 435, the purchase indicator for the device associated with the unique device identifier is checked. If the purchase indicator shows that the device has been sold, the call is routed as dialed and the method 400 ends at step 425. If the purchase indicator shows that the device has not been sold, the method 400 ends at 440 where the call is routed to a fraud management center.
-
FIG. 5 shows a method 500 of detecting a stolen device where the stolen device is attempting to access the wireless network using a valid subscriber identifier. In addition to a unique device identifier, wireless networks also can utilize a unique subscriber identifier. In the case of a GSM network, the removable subscriber identity module (SIM) card inside of a phone. The SIM card contains the international mobile subscriber identifier (IMSI) which is used to associate a billing account with a wireless subscriber. A SIM card that is associated with an active wireless account can be removed from one phone and placed in another compatible phone. This allows a subscriber to place wireless calls to and/or from the second phone that are billed to the account associated with the SIM card. - This functionality creates a situation where a current subscriber could use a stolen phone by simply removing the SIM card from an old phone and placing it into the stolen phone. The method 500 shown in
FIG. 5 prevents a stolen phone from being used in this way. In this embodiment, an account management system is included in the wireless network that contains an association between a subscriber, an account, and a subscriber identification number (such as an IMSI located on the subscriber's SIM card). The account management system also can include an association between a subscriber identification number and a device identification number used by the subscriber. Alternatively, the device management system includes such an association. - The method 500 begins at 510 where a wireless device attempts to place a call on a wireless network. The network captures a unique device identifier and a unique subscriber identifier from the wireless device at 515. At 520 the account management system is searched for the captured subscriber identifier. Operation proceeds to decision step 525. The outcome of decision step 525 depends on whether or not the subscriber identifier was located in the account management system. If the subscriber identifier was not found the device is not allowed to place the call, and the method 500 stops at 530. For legacy devices that do not transmit a subscriber identity, the subscriber identity can be determined from account information as is known in the art. If no subscriber identifier is found in the account management system then no one can be billed for the call. The call is therefore not allowed. Alternatively, a phone placing such a call can be locked, or the call can be forwarded to a fraud management group, a recorded message, or be handled as otherwise known in the art.
- If the subscriber identifier is found, processing continues to 535 where the account management system is queried to determine if the device identifier associated with the subscriber identifier in the account management system matches the device identifier captured from the wireless device attempting the call. Alternatively, the device management system can be checked for this information if the association is stored there. It should be understood that in some embodiments the account management system and the device management system may be integrated, for example, on the same server, or in the same database. If the device identifiers match, the call is routed as dialed and the method 500 ends at 540.
- If the two device identifiers do not match, then processing continues to 545. If the identifiers do not match, then it means that the subscriber is attempting to access the network using a phone other than the one previously used to place calls. At 545 the “participation type” field corresponding to the captured device identifier is checked in the device management system to see if the device is marked as having been shipped to a participating retailer. If it is not, then the method 500 ends at 540 and the call is routed as dialed. If the device is marked as having been sold to a participating retailer, then processing continues to 550.
- At 550, the purchase indicator for the device is checked to see if it is marked as sold or not sold. If the purchase indicator shows that the device has been sold, the method 500 ends at 540 and the call is routed as dialed. If the purchase indicator shows that the device has not been sold, the call is routed to a fraud management center at 555.
- The present disclosure has been illustrated in relation to particular embodiments that are intended in all respects to be illustrative rather than restrictive. Those skilled in the art will recognize that the present disclosure is capable of many modifications and variations without departing from the scope of the disclosure.
- Those skilled in the art also will appreciate that the system and methods described represent only examples of the various configurations that will be suitable for implementation of the various embodiments of the disclosure.
- It must be emphasized that the law does not require and it is economically prohibitive to illustrate and teach every possible embodiment of the present claims. Hence, the above-described embodiments are merely exemplary illustrations of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiments without departing from the scope of the claims. All such modifications, combinations, and variations are included herein by the scope of this disclosure and the following claims.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/479,329 US8050655B2 (en) | 2005-10-31 | 2009-06-05 | Systems and methods for restricting the use of stolen devices on a wireless network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/264,647 US7567795B1 (en) | 2005-10-31 | 2005-10-31 | Systems and methods for restricting the use of stolen devices on a wireless network |
US12/479,329 US8050655B2 (en) | 2005-10-31 | 2009-06-05 | Systems and methods for restricting the use of stolen devices on a wireless network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/264,647 Continuation US7567795B1 (en) | 2005-10-31 | 2005-10-31 | Systems and methods for restricting the use of stolen devices on a wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090247131A1 true US20090247131A1 (en) | 2009-10-01 |
US8050655B2 US8050655B2 (en) | 2011-11-01 |
Family
ID=40887328
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/264,647 Expired - Fee Related US7567795B1 (en) | 2005-10-31 | 2005-10-31 | Systems and methods for restricting the use of stolen devices on a wireless network |
US12/479,329 Expired - Fee Related US8050655B2 (en) | 2005-10-31 | 2009-06-05 | Systems and methods for restricting the use of stolen devices on a wireless network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/264,647 Expired - Fee Related US7567795B1 (en) | 2005-10-31 | 2005-10-31 | Systems and methods for restricting the use of stolen devices on a wireless network |
Country Status (1)
Country | Link |
---|---|
US (2) | US7567795B1 (en) |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080120174A1 (en) * | 2006-11-16 | 2008-05-22 | Verizon Services Organization Inc. | Method and system for flexible product and service bundling |
US20090287589A1 (en) * | 2008-05-16 | 2009-11-19 | Fivel Steven E | Mobile, compact communication device including rfid |
US20110021174A1 (en) * | 2009-07-22 | 2011-01-27 | Kouros Azimi | Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected |
US20110098030A1 (en) * | 2009-10-27 | 2011-04-28 | Nokia Corporation | Method and apparatus for activating services |
US20110153441A1 (en) * | 2009-12-23 | 2011-06-23 | Merrill Brooks Smith | Systems and Methods for Authorizing Use of Validly Sold Merchandise |
US20120263285A1 (en) * | 2005-04-21 | 2012-10-18 | Anthony Rajakumar | Systems, methods, and media for disambiguating call data to determine fraud |
US20120265706A1 (en) * | 2010-11-05 | 2012-10-18 | Atc Logistics & Electronics, Inc. | Shipping system and method for tracking customer personal information |
US8295812B1 (en) * | 2010-10-15 | 2012-10-23 | Sprint Communications Company L.P. | Reducing mobile-phone fraud |
US20140058863A1 (en) * | 2012-08-21 | 2014-02-27 | Adobe Systems Incorporated | Systems And Methods For Product Purchase And Registration |
US8688072B1 (en) * | 2010-12-30 | 2014-04-01 | Sprint Communications Company L.P. | Agent notification triggered by network access failure |
US9460722B2 (en) | 2013-07-17 | 2016-10-04 | Verint Systems Ltd. | Blind diarization of recorded calls with arbitrary number of speakers |
US9503571B2 (en) | 2005-04-21 | 2016-11-22 | Verint Americas Inc. | Systems, methods, and media for determining fraud patterns and creating fraud behavioral models |
US9571652B1 (en) | 2005-04-21 | 2017-02-14 | Verint Americas Inc. | Enhanced diarization systems, media and methods of use |
WO2017217873A1 (en) * | 2016-06-16 | 2017-12-21 | Camus Loredo Jorge Luis | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies |
US9875739B2 (en) | 2012-09-07 | 2018-01-23 | Verint Systems Ltd. | Speaker separation in diarization |
US9875742B2 (en) | 2015-01-26 | 2018-01-23 | Verint Systems Ltd. | Word-level blind diarization of recorded calls with arbitrary number of speakers |
US9984706B2 (en) | 2013-08-01 | 2018-05-29 | Verint Systems Ltd. | Voice activity detection using a soft decision mechanism |
US10134401B2 (en) | 2012-11-21 | 2018-11-20 | Verint Systems Ltd. | Diarization using linguistic labeling |
US10425394B1 (en) * | 2008-09-08 | 2019-09-24 | United Services Automobile Association (Usaa) | System and method for disabling and/or enabling a device |
US10728398B2 (en) | 2001-09-24 | 2020-07-28 | E2Interactive, Inc. | Inserting value into customer account at point of sale using a customer account identifier |
US10887452B2 (en) | 2018-10-25 | 2021-01-05 | Verint Americas Inc. | System architecture for fraud detection |
US10937076B2 (en) | 2010-10-13 | 2021-03-02 | E2Interactive, Inc. | Online personalized gifting system |
US10954049B2 (en) | 2017-12-12 | 2021-03-23 | E2Interactive, Inc. | Viscous liquid vessel for gifting |
US11017443B2 (en) | 2014-04-30 | 2021-05-25 | E2Interactive, Inc. | System and method for a merchant onsite personalization gifting platform |
US11055686B2 (en) | 2012-08-08 | 2021-07-06 | E2Interactive, Inc. | S/M for providing, reloading, and redeeming stored value cards used in transit applications |
US11111065B2 (en) | 2013-02-15 | 2021-09-07 | E2Interactive, Inc. | Gift card presentation devices |
US11115521B2 (en) | 2019-06-20 | 2021-09-07 | Verint Americas Inc. | Systems and methods for authentication and fraud detection |
US11120428B2 (en) | 2013-05-02 | 2021-09-14 | E2Interactive, Inc. | Stored value card kiosk system and method |
US11120462B2 (en) | 2013-11-04 | 2021-09-14 | E2Interactive, Inc. | Systems and methods for using indicia of membership as a partial authorization in a transaction |
US11182836B2 (en) | 2010-10-13 | 2021-11-23 | E2Interactive, Inc. | Gift card ordering system and method |
US11219288B2 (en) | 2013-02-15 | 2022-01-11 | E2Interactive, Inc. | Gift card box with slanted tray and slit |
US11436651B2 (en) | 2012-01-30 | 2022-09-06 | E2Interactive, Inc. | Group video generating system |
US11538128B2 (en) | 2018-05-14 | 2022-12-27 | Verint Americas Inc. | User interface for fraud alert management |
US11868453B2 (en) | 2019-11-07 | 2024-01-09 | Verint Americas Inc. | Systems and methods for customer authentication based on audio-of-interest |
US11928696B2 (en) | 2009-12-16 | 2024-03-12 | E2Interactive, Inc. | Systems and methods for generating a virtual value item for a promotional campaign |
US11978031B2 (en) | 2010-12-14 | 2024-05-07 | E2Interactive, Inc. | Systems and methods that create a pseudo prescription from transaction data generated during a point of sale purchase at a front of a store |
US12020309B2 (en) | 2018-05-18 | 2024-06-25 | E2Interactive, Inc. | Augmented reality gifting on a mobile device |
US12126761B2 (en) | 2022-01-31 | 2024-10-22 | Verint Americas Inc. | System architecture for fraud detection |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7567795B1 (en) * | 2005-10-31 | 2009-07-28 | At&T Mobility Ii Llc | Systems and methods for restricting the use of stolen devices on a wireless network |
US8249935B1 (en) | 2007-09-27 | 2012-08-21 | Sprint Communications Company L.P. | Method and system for blocking confidential information at a point-of-sale reader from eavesdropping |
US9883381B1 (en) | 2007-10-02 | 2018-01-30 | Sprint Communications Company L.P. | Providing secure access to smart card applications |
US8655310B1 (en) * | 2008-04-08 | 2014-02-18 | Sprint Communications Company L.P. | Control of secure elements through point-of-sale device |
US8768845B1 (en) | 2009-02-16 | 2014-07-01 | Sprint Communications Company L.P. | Electronic wallet removal from mobile electronic devices |
US8800061B2 (en) * | 2009-03-06 | 2014-08-05 | Absolute Software Corporation | Automatic control of a security protection mode of an electronic device |
US20130047271A1 (en) * | 2011-08-19 | 2013-02-21 | Ding-Yuan Tang | Author Authorization of Electronic Works |
US8914853B2 (en) * | 2012-12-07 | 2014-12-16 | Verizon Patent And Licensing Inc. | Blocking network access for unauthorized mobile devices |
CN104079525B (en) * | 2013-03-25 | 2015-11-11 | 腾讯科技(深圳)有限公司 | A kind ofly prevent plug-in method and server |
US10354251B1 (en) | 2013-07-26 | 2019-07-16 | Sprint Communications Company L.P. | Assigning risk levels to electronic commerce transactions |
US20190221083A1 (en) * | 2015-05-05 | 2019-07-18 | Invue Security Products Inc. | Wireless beacon tracking system for merchandise security |
US11216262B2 (en) * | 2016-03-25 | 2022-01-04 | Microsoft Technology Licensing, Llc | Device provisioning |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5335278A (en) * | 1991-12-31 | 1994-08-02 | Wireless Security, Inc. | Fraud prevention system and process for cellular mobile telephone networks |
US6061558A (en) * | 1992-01-27 | 2000-05-09 | Highwaymaster Communications, Inc. | Method and apparatus for a nation-wide cellular telephone network |
US20030216969A1 (en) * | 2002-01-23 | 2003-11-20 | Bauer Donald G. | Inventory management system |
US20060009214A1 (en) * | 2004-07-07 | 2006-01-12 | Cardina Donald M | System and method for IMEI detection and alerting |
US7567795B1 (en) * | 2005-10-31 | 2009-07-28 | At&T Mobility Ii Llc | Systems and methods for restricting the use of stolen devices on a wireless network |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5625669A (en) * | 1991-09-27 | 1997-04-29 | Telemac Cellular Corporation | Mobile phone with internal call accounting controls |
US5878337A (en) * | 1996-08-08 | 1999-03-02 | Joao; Raymond Anthony | Transaction security apparatus and method |
US6038440A (en) * | 1997-06-23 | 2000-03-14 | Ericsson Inc. | Processing of emergency calls in wireless communications system with fraud protection |
US5933776A (en) * | 1997-07-07 | 1999-08-03 | Hewlett-Packard Company | Method and apparatus for field testing cellular telephones |
US6577861B2 (en) * | 1998-12-14 | 2003-06-10 | Fujitsu Limited | Electronic shopping system utilizing a program downloadable wireless telephone |
US6259907B1 (en) * | 1999-11-30 | 2001-07-10 | Gte Wireless Service Corporation | System and method of retrieving and formatting data from cellular telephone switches |
US6590967B1 (en) * | 2001-05-23 | 2003-07-08 | Worldcom, Inc. | Variable length called number screening |
US7991386B2 (en) * | 2003-11-14 | 2011-08-02 | E2Interactive, Inc. | System and method for authorizing the activation of a communication device |
US6681989B2 (en) * | 2002-01-15 | 2004-01-27 | International Business Machines Corporation | Inventory control and point-of-sale system and method |
WO2005076726A2 (en) * | 2004-02-17 | 2005-08-25 | Checkpoint Software Technologies Ltd. | Mobile network security system |
-
2005
- 2005-10-31 US US11/264,647 patent/US7567795B1/en not_active Expired - Fee Related
-
2009
- 2009-06-05 US US12/479,329 patent/US8050655B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5335278A (en) * | 1991-12-31 | 1994-08-02 | Wireless Security, Inc. | Fraud prevention system and process for cellular mobile telephone networks |
US6061558A (en) * | 1992-01-27 | 2000-05-09 | Highwaymaster Communications, Inc. | Method and apparatus for a nation-wide cellular telephone network |
US20030216969A1 (en) * | 2002-01-23 | 2003-11-20 | Bauer Donald G. | Inventory management system |
US20060009214A1 (en) * | 2004-07-07 | 2006-01-12 | Cardina Donald M | System and method for IMEI detection and alerting |
US7567795B1 (en) * | 2005-10-31 | 2009-07-28 | At&T Mobility Ii Llc | Systems and methods for restricting the use of stolen devices on a wireless network |
Cited By (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10834268B2 (en) | 2001-09-24 | 2020-11-10 | E2Interactive, Inc. | Inserting value into customer account at point of sale using a customer account identifier |
US10728398B2 (en) | 2001-09-24 | 2020-07-28 | E2Interactive, Inc. | Inserting value into customer account at point of sale using a customer account identifier |
US9113001B2 (en) * | 2005-04-21 | 2015-08-18 | Verint Americas Inc. | Systems, methods, and media for disambiguating call data to determine fraud |
US9571652B1 (en) | 2005-04-21 | 2017-02-14 | Verint Americas Inc. | Enhanced diarization systems, media and methods of use |
US9503571B2 (en) | 2005-04-21 | 2016-11-22 | Verint Americas Inc. | Systems, methods, and media for determining fraud patterns and creating fraud behavioral models |
US20120263285A1 (en) * | 2005-04-21 | 2012-10-18 | Anthony Rajakumar | Systems, methods, and media for disambiguating call data to determine fraud |
US20080120174A1 (en) * | 2006-11-16 | 2008-05-22 | Verizon Services Organization Inc. | Method and system for flexible product and service bundling |
US20090287589A1 (en) * | 2008-05-16 | 2009-11-19 | Fivel Steven E | Mobile, compact communication device including rfid |
US10425394B1 (en) * | 2008-09-08 | 2019-09-24 | United Services Automobile Association (Usaa) | System and method for disabling and/or enabling a device |
US20110021174A1 (en) * | 2009-07-22 | 2011-01-27 | Kouros Azimi | Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected |
US8280347B2 (en) * | 2009-07-22 | 2012-10-02 | Lsi Corporation | Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected |
US20110098030A1 (en) * | 2009-10-27 | 2011-04-28 | Nokia Corporation | Method and apparatus for activating services |
US11928696B2 (en) | 2009-12-16 | 2024-03-12 | E2Interactive, Inc. | Systems and methods for generating a virtual value item for a promotional campaign |
US20110153441A1 (en) * | 2009-12-23 | 2011-06-23 | Merrill Brooks Smith | Systems and Methods for Authorizing Use of Validly Sold Merchandise |
US10937076B2 (en) | 2010-10-13 | 2021-03-02 | E2Interactive, Inc. | Online personalized gifting system |
US11182836B2 (en) | 2010-10-13 | 2021-11-23 | E2Interactive, Inc. | Gift card ordering system and method |
US8295812B1 (en) * | 2010-10-15 | 2012-10-23 | Sprint Communications Company L.P. | Reducing mobile-phone fraud |
US8483663B1 (en) * | 2010-10-15 | 2013-07-09 | Sprint Communications Company L.P. | Reducing mobile-phone fraud |
US20120265706A1 (en) * | 2010-11-05 | 2012-10-18 | Atc Logistics & Electronics, Inc. | Shipping system and method for tracking customer personal information |
US9922302B2 (en) * | 2010-11-05 | 2018-03-20 | FedEx Supply Chain Logistics & Electronics, Inc. | Shipping system and method for tracking customer personal information |
US11978031B2 (en) | 2010-12-14 | 2024-05-07 | E2Interactive, Inc. | Systems and methods that create a pseudo prescription from transaction data generated during a point of sale purchase at a front of a store |
US8688072B1 (en) * | 2010-12-30 | 2014-04-01 | Sprint Communications Company L.P. | Agent notification triggered by network access failure |
US11436651B2 (en) | 2012-01-30 | 2022-09-06 | E2Interactive, Inc. | Group video generating system |
US11055686B2 (en) | 2012-08-08 | 2021-07-06 | E2Interactive, Inc. | S/M for providing, reloading, and redeeming stored value cards used in transit applications |
US20140058863A1 (en) * | 2012-08-21 | 2014-02-27 | Adobe Systems Incorporated | Systems And Methods For Product Purchase And Registration |
US9679288B2 (en) * | 2012-08-21 | 2017-06-13 | Adobe Systems Incorporated | Systems and methods for product purchase and registration |
US9875739B2 (en) | 2012-09-07 | 2018-01-23 | Verint Systems Ltd. | Speaker separation in diarization |
US10692501B2 (en) | 2012-11-21 | 2020-06-23 | Verint Systems Ltd. | Diarization using acoustic labeling to create an acoustic voiceprint |
US11367450B2 (en) | 2012-11-21 | 2022-06-21 | Verint Systems Inc. | System and method of diarization and labeling of audio data |
US10438592B2 (en) | 2012-11-21 | 2019-10-08 | Verint Systems Ltd. | Diarization using speech segment labeling |
US10446156B2 (en) | 2012-11-21 | 2019-10-15 | Verint Systems Ltd. | Diarization using textual and audio speaker labeling |
US10522153B2 (en) | 2012-11-21 | 2019-12-31 | Verint Systems Ltd. | Diarization using linguistic labeling |
US10522152B2 (en) | 2012-11-21 | 2019-12-31 | Verint Systems Ltd. | Diarization using linguistic labeling |
US10650826B2 (en) | 2012-11-21 | 2020-05-12 | Verint Systems Ltd. | Diarization using acoustic labeling |
US11776547B2 (en) | 2012-11-21 | 2023-10-03 | Verint Systems Inc. | System and method of video capture and search optimization for creating an acoustic voiceprint |
US10134400B2 (en) | 2012-11-21 | 2018-11-20 | Verint Systems Ltd. | Diarization using acoustic labeling |
US10692500B2 (en) | 2012-11-21 | 2020-06-23 | Verint Systems Ltd. | Diarization using linguistic labeling to create and apply a linguistic model |
US10720164B2 (en) | 2012-11-21 | 2020-07-21 | Verint Systems Ltd. | System and method of diarization and labeling of audio data |
US10134401B2 (en) | 2012-11-21 | 2018-11-20 | Verint Systems Ltd. | Diarization using linguistic labeling |
US11380333B2 (en) | 2012-11-21 | 2022-07-05 | Verint Systems Inc. | System and method of diarization and labeling of audio data |
US11322154B2 (en) | 2012-11-21 | 2022-05-03 | Verint Systems Inc. | Diarization using linguistic labeling |
US11227603B2 (en) | 2012-11-21 | 2022-01-18 | Verint Systems Ltd. | System and method of video capture and search optimization for creating an acoustic voiceprint |
US10902856B2 (en) | 2012-11-21 | 2021-01-26 | Verint Systems Ltd. | System and method of diarization and labeling of audio data |
US10950241B2 (en) | 2012-11-21 | 2021-03-16 | Verint Systems Ltd. | Diarization using linguistic labeling with segmented and clustered diarized textual transcripts |
US10950242B2 (en) | 2012-11-21 | 2021-03-16 | Verint Systems Ltd. | System and method of diarization and labeling of audio data |
US11111065B2 (en) | 2013-02-15 | 2021-09-07 | E2Interactive, Inc. | Gift card presentation devices |
US11219288B2 (en) | 2013-02-15 | 2022-01-11 | E2Interactive, Inc. | Gift card box with slanted tray and slit |
US11120428B2 (en) | 2013-05-02 | 2021-09-14 | E2Interactive, Inc. | Stored value card kiosk system and method |
US10109280B2 (en) | 2013-07-17 | 2018-10-23 | Verint Systems Ltd. | Blind diarization of recorded calls with arbitrary number of speakers |
US9460722B2 (en) | 2013-07-17 | 2016-10-04 | Verint Systems Ltd. | Blind diarization of recorded calls with arbitrary number of speakers |
US9881617B2 (en) | 2013-07-17 | 2018-01-30 | Verint Systems Ltd. | Blind diarization of recorded calls with arbitrary number of speakers |
US9984706B2 (en) | 2013-08-01 | 2018-05-29 | Verint Systems Ltd. | Voice activity detection using a soft decision mechanism |
US10665253B2 (en) | 2013-08-01 | 2020-05-26 | Verint Systems Ltd. | Voice activity detection using a soft decision mechanism |
US11670325B2 (en) | 2013-08-01 | 2023-06-06 | Verint Systems Ltd. | Voice activity detection using a soft decision mechanism |
US11120462B2 (en) | 2013-11-04 | 2021-09-14 | E2Interactive, Inc. | Systems and methods for using indicia of membership as a partial authorization in a transaction |
US11017443B2 (en) | 2014-04-30 | 2021-05-25 | E2Interactive, Inc. | System and method for a merchant onsite personalization gifting platform |
US10726848B2 (en) | 2015-01-26 | 2020-07-28 | Verint Systems Ltd. | Word-level blind diarization of recorded calls with arbitrary number of speakers |
US10366693B2 (en) | 2015-01-26 | 2019-07-30 | Verint Systems Ltd. | Acoustic signature building for a speaker from multiple sessions |
US9875742B2 (en) | 2015-01-26 | 2018-01-23 | Verint Systems Ltd. | Word-level blind diarization of recorded calls with arbitrary number of speakers |
US11636860B2 (en) | 2015-01-26 | 2023-04-25 | Verint Systems Ltd. | Word-level blind diarization of recorded calls with arbitrary number of speakers |
US9875743B2 (en) | 2015-01-26 | 2018-01-23 | Verint Systems Ltd. | Acoustic signature building for a speaker from multiple sessions |
WO2017217873A1 (en) * | 2016-06-16 | 2017-12-21 | Camus Loredo Jorge Luis | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies |
US10954049B2 (en) | 2017-12-12 | 2021-03-23 | E2Interactive, Inc. | Viscous liquid vessel for gifting |
US11538128B2 (en) | 2018-05-14 | 2022-12-27 | Verint Americas Inc. | User interface for fraud alert management |
US12020309B2 (en) | 2018-05-18 | 2024-06-25 | E2Interactive, Inc. | Augmented reality gifting on a mobile device |
US10887452B2 (en) | 2018-10-25 | 2021-01-05 | Verint Americas Inc. | System architecture for fraud detection |
US11240372B2 (en) | 2018-10-25 | 2022-02-01 | Verint Americas Inc. | System architecture for fraud detection |
US11652917B2 (en) | 2019-06-20 | 2023-05-16 | Verint Americas Inc. | Systems and methods for authentication and fraud detection |
US11115521B2 (en) | 2019-06-20 | 2021-09-07 | Verint Americas Inc. | Systems and methods for authentication and fraud detection |
US11868453B2 (en) | 2019-11-07 | 2024-01-09 | Verint Americas Inc. | Systems and methods for customer authentication based on audio-of-interest |
US12126761B2 (en) | 2022-01-31 | 2024-10-22 | Verint Americas Inc. | System architecture for fraud detection |
Also Published As
Publication number | Publication date |
---|---|
US7567795B1 (en) | 2009-07-28 |
US8050655B2 (en) | 2011-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8050655B2 (en) | Systems and methods for restricting the use of stolen devices on a wireless network | |
US10645072B2 (en) | Method and system for validating transactions | |
US10776791B2 (en) | System and method for identity protection using mobile device signaling network derived location pattern recognition | |
US9727867B2 (en) | Method for detecting misuse of identity in electronic transactions | |
US7832636B2 (en) | Method and system for authenticating use of item | |
EP1534043B1 (en) | System and method for authorizing the activation of a communication device | |
AU2003269186B2 (en) | Optimised messages containing barcode information for mobile receiving device | |
US8413898B2 (en) | Method and system for monitoring electronic purchases and cash-withdrawals | |
US8239269B2 (en) | System and/or method for handling returns involving products tied to post-paid subscriptions/services | |
US5839058A (en) | Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within a cellular telephone network | |
US10417641B2 (en) | System and/or method for handling recalled product purchases and/or return/warranty requests | |
US20080079581A1 (en) | Lost item notification and recovery system | |
US11308477B2 (en) | Method of reducing fraud in on-line transactions | |
CN1843046A (en) | System for identifying mobile terminal device automatically and system for value added service access | |
EP2442267A1 (en) | Using a mobile device to make a transaction | |
CA2830341A1 (en) | Method for activating an unlocked, inactive mobile device using a universal integrated circuit card pre-provisioned with a service plan | |
JP2007527173A (en) | Ordering method for mobile radio network users | |
CN111353845A (en) | Mall APP system | |
US7965827B2 (en) | Methods, systems, and products for purchasing pre-paid services | |
CN108932600A (en) | A kind of cargo based on Beidou satellite system is anti-fake and positioning supervisory system and method | |
KR100668389B1 (en) | Method for paying a charge of goods using mobile phone | |
US20050222913A1 (en) | PR/SMS business method, system and method of conducting business | |
US12086803B2 (en) | Method for authenticating internet users | |
KR100622653B1 (en) | System for managing life cycle of mobile station using RFID, and Method thereof | |
CN109961245B (en) | Electronic signing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20231101 |